Top 3 Reasons to Make Terminal Emulation Part of

White Paper
InfoConnect® Desktop
Reflection® Desktop
Rumba+ Desktop
Host Access Management and Security Server
Top 3 Reasons to Make
Terminal Emulation Part
of Your Security Strategy
White Paper
Top 3 Reasons to Make Terminal Emulation Part of Your Security Strategy
Top 3 Reasons to Make
Terminal Emulation Part
of Your Security Strategy
You may not think of them this way, but your host applications are the lifeblood of your company.
After all, they house the critical data underlying everything your business does. And they’ve been housing
it for decades, long before the word internet entered our collective vocabulary.
Over the decades, the landscape around your host applications has
changed. In our digital world, they are no longer safe on the famously
secure mainframe. But what’s a corporate IT department to do? The
process of updating your priceless host applications is inherently complicated, expensive, and riddled with risk. At least that’s what everyone
has always thought.
But what if the tool that you use to access your host applications could
also be used to protect them? This paper supports the power and logic
of that solution. By the time you’re done reading, you’ll know why it’s
time to elevate the status of your terminal emulation software—letting
it play a strategic role in your IT security strategy.
A Powerful, Logical Solution
Here are the top three reasons to revise your thinking about terminal
emulation and give it a more strategic role in your enterprise:
1. Terminal Emulation Software Is the Tool Used to Access
Your Most Valuable Data.
Terminal emulation software is the gateway to your most valuable
corporate jewels—your ­customer data, your intellectual property, your
cutting-edge designs. Yet terminal emulators are generally viewed
as basic commodities with no greater value than any other desktop
application.
Let’s apply an analogy to this topic. Consider the game-changing
television. Moving black-and-white images in two or three dimensions, with sound! People were amazed. Time brought color images,
stereo sound, and bigger screens—but it was still a TV. Today, TVs
2
have an expanded role. Many people, though not all, use them to
surf the internet, Skype with friends, project slideshows, and more.
The first terminal emulator was a game changer, too. People cleared
those dumb terminals off their desks and began accessing host applications with their amazing new PCs. With time came more terminal
types, printing, graphics, automations, and more. But you still had a
basic terminal emulator. That was true until the last ten years, when
terminal emulators became as easy to use as Windows apps, and just
as easy to manage. They also became so secure that they can now
facilitate compliance with even the most stringent security mandates.
2. Advances in Terminal Emulation Technology Qualify It
to Play a Leading Security Role.
The security offered by today’s terminal emulator bears no resemblance to what came before it. Here’s what the modern emulator
can provide:
Military-strength encryption
Today’s terminal emulation solutions provide military-strength
encryption for data in motion and at rest. Built to support the
highest U.S. government security standards (FIPS 140-2 and
DoD PKI), they provide TLS 1.2 encryption and SHA-256/
RSA-2048 digital signatures. It’s easy to configure your security
controls and then update them as needed. This high level of
­security helps companies safeguard their information assets
while meeting regulatory requirements.
Strong mainframe passwords
If you have an older emulator, a simple eight-character, caseinsensitive password is all that stands between a malicious
hacker and your precious host data. Today’s terminal ­emulators
can use your corporate Identity and Access Management (IAM)
system to authenticate users all the way to the mainframe
application. No more risky passwords to remember. No more
password-reset headaches. Without recoding, you can facilitate
compliance with today’s highest-level security mandates—
even for mainframe access.
Multifactor authentication for mainframe sessions
When you rely solely on usernames and weak passwords, you’re
practically handing h
­ ackers the keys to your kingdom. But reengineering mainframe applications to work with strong ­complex
passwords is risky, difficult, and expensive. So what can you do?
The good news is that you can do something. Modern terminal
emulation solutions are built to provide the strongest possible
authentication for your mainframe systems. Some solutions can
support up to 14 different authentication methods—from smart
cards and mobile text-based verification codes to fingerprint and
retina scans. From this range of options, you can pick the ones
that are easiest for your organization and partners to adopt.
Security proxy for the mainframe
Some terminal emulation solutions use a security proxy to build
a virtual wall of protection around the mainframe. Using new
security technology, the proxy ensures that only authorized users
can get to the door of the mainframe (logon screen). This extra
layer of security helps you control access and prove that you
are compliant with regulatory requirements.
Information privacy and data masking
PCI DSS Requirement 3 of the PCI DSS standard calls for
hiding cardholder data when it’s displayed in a payment system.
Not all terminal emulation solutions address this mandate.
But some products give you the ability to easily mask any
type of data on host screens—credit card numbers, contact
­information, social security numbers, birthdays, account ­balances,
and other private information. You can even redact data as it
is being typed into host ­sessions and prevent data from being
stolen via screen or host printing. These capabilities place
­another barrier in the way of insider fraud and human error.
3. If You Don’t Tend Your Terminal Emulation Garden,
You Will Quickly Lose Control.
Companies have been using terminal emulation software for thirtyplus years. In that time, the products have changed dramatically along
with everything around them. Like any garden left untended, this
environment has likely cultivated lots of weeds and pests that need
to be dealt with:
www.microfocus.com
Old versions
If you think my terminal emulators work, so why update them,
here’s why: With security breaches and insider fraud on the rise,
organizations must tightly protect their sensitive s­ ystems and
data. If you don’t update your emulators accordingly, you may
be jeopardizing your networks, host systems, host data, and
host-dependent business processes. You also risk being out of
compliance with new government regulations and standards—
including PCI-DSS, USGCB, FDCC, ENISA, and FIPS 140-2.
Modern terminal emulators are equipped to facilitate compliance. Older versions are not.
User settings
Terminal emulation clients typically allow users to record macros
and change settings to streamline work processes. But when
users share their macros and unintentionally weaken security
­settings, they introduce risk to the enterprise. You need to know
who owns the m
­ acros in your enterprise, who’s using them, where
they are stored, and what they do. You need to be able to customize and control settings for users and groups. Secure terminal
emulators provide the granular controls to help you do that.
In large organizations with 1000s of desktops across 100s of locations, strong security isn’t p
­ ossible without strong management. With
todays’ terminal emulation solutions, you can m
­ anage your hostaccess operation centrally. In other words, from a central server you
can easily lock down desktops to prevent the use of rogue macros
and changes to security settings. You can grant or deny access based
on group or role via your IAM system. You can make post-install
­adjustments on the fly. Users typically receive their updates when
they launch a session.
Put Your Garden in Order
When assessing the security of your host systems, applications, and
data, don’t forget to also assess the tools they work with—specifically,
your terminal emulators. Just because your emulators have always
worked smoothly, that doesn’t mean they always will. In the last five to
ten years, some of them have made notable advancements—advancements that will change the way you think about terminal emulation.
For more than 30 years, Micro Focus has developed highly secure
terminal emulation products and helped customers seamlessly move
to more secure solutions. We focus our development efforts on staying
ahead of what’s going on around your terminal emulator. That means our
solutions are always equipped with the latest security technologies, and
they’re always ready to help you navigate the e
­ ver-changing IT security
landscape. For that reason, they must play a key role in your overarching
IT security strategy.
3
Micro Focus
UK Headquarters
United Kingdom
+44 (0) 1635 565200
U.S. Headquarters
Rockville, Maryland
301 838 5000
877 772 4450
Additional contact information and office locations:
www.microfocus.com
www.microfocus.com
162-000108-001 | M | 02/17 | © 2017 Micro Focus. All rights reserved. Micro Focus, the Micro Focus logo, InfoConnect, and Reflection, among others, are trademarks
or registered trademarks of Micro Focus or its subsidiaries or affiliated companies in the United Kingdom, United States and other countries. All other marks are the property
of their respective owners.